 
                            Recommendations
FIO00-A. Validate deserialized objects
FIO01-A. Canonicalize path names originating from untrusted sources
FIO02-A. Use Runtime.exec() correctly
Rules
FIO31-C. Create a copy of mutable inputs
FIO32-C. Do not serialize sensitive data
FIO33-C. Do not allow serialization and deserialization to bypass the Security Manager
FIO34-C. Ensure all resources are properly closed when they are no longer needed
Risk Assessment Summary
Recommendations
| Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| FIO00-A | 1 (low) | 1 (unlikely) | 2 (medium) | P2 | L3 | 
Rules
| Rules | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| FIO30-C | 1 (low) | 1 (unlikely) | 2 (medium) | P2 | L3 |